Sciweavers

3 search results - page 1 / 1
» Nefarious Numbers
Sort
View
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 2 months ago
Nefarious Numbers
Douglas N. Arnold, Kristine K. Fowler
USS
2010
13 years 3 months ago
Searching the Searchers with SearchAudit
Search engines not only assist normal users, but also provide information that hackers and other malicious entities can exploit in their nefarious activities. With carefully craft...
John P. John, Fang Yu, Yinglian Xie, Martín...
CCR
2004
116views more  CCR 2004»
13 years 5 months ago
An empirical study of "bogon" route advertisements
An important factor in the robustness of the interdomain routing system is whether the routers in autonomous systems (ASes) filter routes for "bogon" address space--i.e....
Nick Feamster, Jaeyeon Jung, Hari Balakrishnan